Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15533: Heap-based Buffer Overflow in raysan5 raylib

0
Medium
VulnerabilityCVE-2025-15533cvecve-2025-15533
Published: Sun Jan 18 2026 (01/18/2026, 05:02:08 UTC)
Source: CVE Database V5
Vendor/Project: raysan5
Product: raylib

Description

A vulnerability was determined in raysan5 raylib up to 909f040. Affected by this vulnerability is the function GenImageFontAtlas of the file src/rtext.c. Executing a manipulation can lead to heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. This patch is called 5a3391fdce046bc5473e52afbd835dd2dc127146. Applying a patch is advised to resolve this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:42:12 UTC

Technical Analysis

CVE-2025-15533 is a heap-based buffer overflow vulnerability found in the GenImageFontAtlas function within the src/rtext.c file of the raysan5 raylib library, specifically up to commit 909f040. The vulnerability arises due to improper handling of memory allocation or bounds checking when generating font atlases, which can be manipulated by a local attacker to overflow heap buffers. This overflow can corrupt adjacent memory, potentially leading to application crashes, data corruption, or escalation of privileges if exploited effectively. The attack vector is local, requiring the attacker to have limited privileges on the system but no user interaction is needed for exploitation. The vulnerability has been publicly disclosed, increasing the risk of exploitation, though no active exploits have been reported in the wild. The patch addressing this issue is identified by commit 5a3391fdce046bc5473e52afbd835dd2dc127146 and should be applied to affected versions to remediate the flaw. The CVSS 4.0 vector indicates low attack complexity and no user interaction, but limited scope and privileges required, resulting in a medium severity rating.

Potential Impact

The primary impact of this vulnerability is the potential for local attackers to cause heap memory corruption, which can lead to application instability, crashes, or potentially arbitrary code execution if combined with other vulnerabilities or conditions. For organizations, this could mean disruption of services or compromise of systems running applications built with the vulnerable raylib version. Although the attack requires local access and limited privileges, insider threats or compromised user accounts could exploit this vulnerability to escalate privileges or disrupt operations. The medium CVSS score reflects moderate risk, but the public disclosure increases the urgency to patch. Since raylib is commonly used in multimedia and game development, organizations in software development, gaming, and embedded systems sectors may be particularly affected. The vulnerability does not directly impact remote systems, limiting widespread exploitation but still posing a risk in environments where local access is possible.

Mitigation Recommendations

1. Apply the official patch identified by commit 5a3391fdce046bc5473e52afbd835dd2dc127146 immediately to all affected raylib versions to eliminate the vulnerability. 2. Restrict local access to systems running applications built with the vulnerable raylib version to trusted users only, minimizing the risk of local exploitation. 3. Implement strict privilege separation and least privilege principles to reduce the impact if a local attacker attempts exploitation. 4. Monitor local system logs and application behavior for signs of memory corruption or unusual crashes that could indicate attempted exploitation. 5. For development environments, ensure that raylib dependencies are regularly updated and integrated into continuous integration pipelines to catch and remediate vulnerabilities promptly. 6. Educate developers and system administrators about the importance of applying patches for third-party libraries like raylib to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T16:11:40.667Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696c6b91d302b072d998d84a

Added to database: 1/18/2026, 5:11:45 AM

Last enriched: 2/23/2026, 10:42:12 PM

Last updated: 3/23/2026, 10:35:21 PM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses